13.8.8 Practice Questions
You want a security solution that protects the entire hard drive, preventing access even when it is moved to another system. Which of the following is the BEST method for achieving your goals?
Bitlocker
A user stores sensitive data on a USB flash drive. Which of the following can be used to encrypt the data on this drive?
Bitlocker To Go
Which of the following security solutions would prevent a user from reading a file which she did not create?
EFS
A user has file that contains sensitive data. Which of the following can be used to encrypt a single file?
EFS
Which of the following protocols establish a secure connection and encrypt data for a VPN? (Select THREE)
L2TP IPSec PPTP
A VPN is used primary for what purpose?
Support secured communications over an untrusted network
Which of the following components is a special hardware ship included on the computer motherboard that contains software in firmware that generates and stores cryptographic keys?
Trusted Platform Module (TPM)
Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?
WEP, WPA Personal, and WPA2 Personal
Which of the following provides the BEST security for wireless networks?
WPA2
Which of the following forms of networking is highly susceptible to eavesdropping (data interception) and must be secured accordingly?
Wireless